Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
About the Authors | p. ix |
Preface | p. xix |
Introduction and Overview | p. 1 |
Nature of the Problem | |
Manifestations of Aggression: Terrorism, Crime, and War | p. 17 |
The Etiology of Terrorism: Identifying, Defining, and Studying Terrorists | p. 40 |
Balancing Counterterrorism Strategies: Lessons from Evolutionary Ecology | p. 66 |
Gangs, Crime, and Terrorism | p. 97 |
Women Terrorists | p. 113 |
Strategies for Intervention | |
Is Crime Prevention Relevant to Counterterrorism? | p. 129 |
Implications of Opportunity Theory for Combating Terrorism | p. 151 |
Soldiers and Spies, Police and Detectives | p. 183 |
Community Policing and Terrorism: Problems and Prospects for Local Community Security | p. 208 |
Go Analyze! (Connecting the Dots) | p. 245 |
Managing the Fear of Terrorism | p. 273 |
Should Profiling Be Used to Prevent Terrorism? | p. 300 |
Federal-Local Coordination in Homeland Security | p. 322 |
Liberty and Security in an Era of Terrorism | p. 357 |
Regulating Terrorism | p. 383 |
Thinking About Tomorrow | |
Using Open Source Data to Counter Common Myths about Terrorism | p. 411 |
Criminal Justice and Terrorism: A Research Agenda | p. 443 |
Index | p. 461 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.